Data Security for the Internet of Things

| April 19, 2018

article image
Distributed ledger technologies (DLT), commonly referred to as blockchain technology, are likely to disrupt many industries. Although blockchain’s potential for transforming financial services is well known, this technology’s impact on other areas is less understood. To learn how DLT can facilitate the Internet-of-Things (IoT) revolution, I interviewed Wilfried Pimenta de Miranda (INSEAD GEMBA ‘13), Head of Business Development at the IOTA Foundation. This is what I learnt:IOTA is a non-profit foundation registered in Germany. IOTA’s founders have developed the Tangle, an open-source communication and transaction protocol for the IoT. Blockchain remains an early-stage technology which is yet to reach production readiness and large-scale deployment across industries.

Spotlight

Sequent

Sequent secures data on the move and does so in a way that reduces friction and improves the customer experience through tokenization. Sequent enables digital transformation, making it easier for businesses to do business with their customers with its flagship product, Sequent Platform, performs and orchestrates the tokenization and digital issuance of any type of card, account or ID credential to any type of connected device.

OTHER ARTICLES

Microsoft acquires ReFirm Labs to enhance IoT security

Article | June 2, 2021

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

The Rise of the AIoT

Article | June 2, 2021

Artificial intelligence (AI) has existed in the public consciousness for decades. The (mostly) sentient machines playing the villains in Hollywood movies have never been realistic depictions of the technology, but they have left an impression, nonetheless. AI has proved as exciting to the layman as it is to the expert. Usually based in remote data centers, AI is capable of collecting and examining immense volumes of data, generating insights based on analytical algorithms. With varying degrees of autonomy, these capabilities have been put to use streamlining decision-making processes. While AI is often thought of as a product in its own right, it is increasingly intersecting with other parallel trends. Chief among these is the Internet of things (IoT), which enables previously isolated machines to “talk” to one another and, at the same time, generate data that makes new modes of operation a possibility.

Read More

5 Ways to Secure Your IoT Devices—Before They Get Hacked

Article | June 2, 2021

Internet of Things (IoT) devices make our lives more efficient and our day-to-day more convenient. They allow us to monitor our homes from afar, control our lights, thermostats, and locks and beef up the security of our homes—among a host of other things. But because smart devices have become so integrated into our lives, they leave us vulnerable to cybercrime too. In general, IoT devices have little to no built-in security, making them top targets for hackers. And since most IoT devices are interconnected, it puts your whole suite of devices at risk if even one gets hacked. Just as you lock your front door before you go to bed, you’ll want to make sure your IoT devices are secure before you start using them.

Read More

Four ways to ensure IoT success

Article | June 2, 2021

Three out of four IoT projects are considered a failure, according to Cisco. This is troubling but even more so when Cisco also found 61 per cent of companies say they believe they’ve barely begun to scratch the surface of IoT can do for their business? Businesses believe in the long-term value offered by integrating IoT into their business plan, however, they lack the knowledge of what is required to ensure the success of such a complex project. By studying past failed projects, technology leaders can gain a better understanding of why they failed and what they can do differently when evaluating and undertaking new IoT initiatives.

Read More

Spotlight

Sequent

Sequent secures data on the move and does so in a way that reduces friction and improves the customer experience through tokenization. Sequent enables digital transformation, making it easier for businesses to do business with their customers with its flagship product, Sequent Platform, performs and orchestrates the tokenization and digital issuance of any type of card, account or ID credential to any type of connected device.

Events